Communication Theory of Secrecy Systems*
From MaRDI portal
Publication:3645296
Recommendations
Cited in
(only showing first 100 items - show all)- Mechanism design and communication networks
- A new synchronisation method of fractional-order chaotic systems with distinct orders and dimensions and its application in secure communication
- New public-key quantum signature scheme with quantum one-way function
- The many entropies in one-way functions
- Attainable unconditional security for shared-key cryptosystems
- Randomness and Representation of Span n Sequences
- Analyzing permutations for AES-like ciphers: understanding shiftrows
- Absolutely secure message transmission using a key sharing graph
- Connections among nonlinearity, avalanche and correlation immunity
- Leveraging environmental correlations: the thermodynamics of requisite variety
- A method for constructing bijective S-box with high nonlinearity based on chaos and optimization
- Gate elimination for linear functions and new feebly secure constructions
- Integration of quantum key distribution and private classical communication through continuous variable
- Synchronization of different dimensions fractional-order chaotic systems with uncertain parameters and secure communication
- Digital image scrambling based on a new one-dimensional coupled sine map
- Literature survey on nonlinear components and chaotic nonlinear components of block ciphers
- Wave-shaped round functions and primitive groups
- Construction and search of balanced Boolean functions on even number of variables towards excellent autocorrelation profile
- Randomized machine learning of nonlinear models with application to forecasting the development of an epidemic process
- Secrecy via Sources and Channels
- Circuit complexity of linear functions: gate elimination and feeble security
- Feebly secure cryptographic primitives
- A data-driven smoothed particle hydrodynamics method for fluids
- A cryptosystem based on cellular automata
- Two intercept-and-resend attacks on a bidirectional quantum secure direct communication and its improvement
- Investigation for 8-bit \textsc{SKINNY}-like S-boxes, analysis and applications
- Authentication codes in plaintext and chosen-content attacks
- Mathematical problems in cryptology
- On the construction of \(20 \times 20\) and \(2 4 \times 24\) binary matrices with good implementation properties for lightweight block ciphers and hash functions
- Image encryption using the chaotic Josephus matrix
- A method to calculate differential uniformity for permutations
- Quantum encryption and generalized Shannon impossibility
- Analysis of bitsum attack on block ciphers
- FAST, PARALLEL AND SECURE CRYPTOGRAPHY ALGORITHM USING LORENZ'S ATTRACTOR
- The Vernam cipher is robust to small deviations from randomness
- Properties of two Shannon's ciphers
- Doubly perfect nonlinear Boolean permutations
- A new password authentication mechanism based on two phases encryption
- SYNCHRONIZATION OF CHUA CHAOTIC CIRCUITS WITH APPLICATION TO THE BIDIRECTIONAL SECURE COMMUNICATION SYSTEMS
- Effect of Rayleigh fading on non-coherent sequence synchronization for multi-user chaos based DS-CDMA
- Composable security against collective attacks of a modified BB84 QKD protocol with information only in one basis
- Cryptanalysis of a classical chaos-based cryptosystem with some quantum cryptography features
- On the diffusion property of iterated functions
- Illusory decoherence
- From enumerating to generating: a linear time algorithm for generating 2D lattice paths with a given number of turns
- Fault tolerant authenticated quantum dialogue based on logical qubits and controlled-not operations
- Semi-quantum dialogue based on single photons
- Chasing diagrams in cryptography
- Biunitary constructions in quantum information
- A novel stream encryption scheme with avalanche effect
- On APN exponents, characterizations of differentially uniform functions by the Walsh transform, and related cyclic-difference-set-like structures
- Dirac-based reduction techniques for quantitative analysis of discrete-time Markov models
- scientific article; zbMATH DE number 4158546 (Why is no real title available?)
- Characterization for entropy of shifts of finite type on Cayley trees
- Indifferentiability for public key cryptosystems
- Image encryption using finite-precision error
- An improved QKD protocol without public announcement basis using periodically derived basis
- A new fractional one dimensional chaotic map and its application in high-speed image encryption
- Statistical test criteria for sensitivity indexes of image cryptosystems
- A controller-independent quantum dialogue protocol with four-particle states
- Construction of authentication codes based on orthogonal array and Latin square
- Is it possible to reduce the sizes of stegomessages in associative steganography?
- Algebraic attacks against random local functions and their countermeasures
- The Oribatida v1.3 family of lightweight authenticated encryption schemes
- The fast image encryption algorithm based on lifting scheme and chaos
- On the diffusion of the improved generalized Feistel
- Resilient output regulation in heterogeneous networked systems under Byzantine agents
- A novel method to identify initial values of chaotic maps in cybersecurity
- Feistel-inspired scrambling improves the quality of linear congruential generators
- Semi-quantum dialogue with Bell entangled states
- Mediated semi-quantum secure direct communication
- On cryptographic properties of \((n+1)\)-bit S-boxes constructed by known \(n\)-bit S-boxes
- Adaptive chaotic maps and their application to pseudo-random numbers generation
- Construction of lightweight involutory MDS matrices
- Placing conditional disclosure of secrets in the communication complexity universe
- Cryptanalysis of a DNA-based image encryption scheme
- Cryptanalysis and improvement of a reversible data-hiding scheme in encrypted images by redundant space transfer
- On the relationship between resilient Boolean functions and linear branch number of S-boxes
- Bagua: a NFSR-based stream cipher constructed following confusion and diffusion principles
- Shannon impossibility, revisited
- Fast and secure updatable encryption
- Algorithms for checking some properties of \(n\)-quasigroups
- Counting active S-boxes is not enough
- On the construction of involutory MDS matrices over \(\mathbb{F}_{2^m}\)
- Randomized component based secure secret reconstruction in insecure networks
- A privacy scheme for digital images based on quantum particles
- Some group-theoretical results on Feistel networks in a long-key scenario
- On the power of cascade ciphers
- Identity-based quantum designated verifier signature
- A semi-quantum private comparison with high-level security third party
- Controlled SWAP attack and improved quantum encryption of arbitrated quantum signature schemes
- Quantum Key‐Distribution Protocols Based on a Quantum Version of the Monty Hall Game
- Cryptanalysis of hybrid secure image encryption based on Julia set fractals and three-dimensional Lorenz chaotic map
- Demonstration of the no-hiding theorem on the 5-qubit IBM quantum computer in a category-theoretic framework
- A new matrix form to generate all \(3\times 3\) involutory MDS matrices over \(\mathbb{F}_{2^m}\)
- On Hiding a Plaintext Length by Preencryption
- Quantum secret sharing based on continuous-variable GHZ states
- The global avalanche characteristics of two Boolean functions and algebraic immunity
- Block encryption of quantum messages
- On the construction of \(4 \times 4\) lightweight involutory MDS matrices over \(\mathbb{F}_{2^8}\)
This page was built for publication: Communication Theory of Secrecy Systems*
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3645296)